[go: up one dir, main page]

Hui, 2015 - Google Patents

Modern identity protection: A multifaceted response to a surreptitious threat

Hui, 2015

View PDF
Document ID
6157454097808735260
Author
Hui S
Publication year
Publication venue
Sing. L. Rev.

External Links

Snippet

Technology and the Internet are driving huge informational flows. Fears of identity theft are growing, and this article seeks to unpack the corresponding safeguards. It examines how identity theft seizes control of personal information and uses it to impersonate another. It …
Continue reading at papers.ssrn.com (PDF) (other versions)

Similar Documents

Publication Publication Date Title
Frank et al. Approach to cyber security issues in Nigeria: challenges and solution
Chawki Nigeria tackles advance fee fraud
Smith Identity theft and fraud
Makeri Cyber security issues in Nigeria and challenges
Cassim Protecting personal information in the era of identity theft: Just how safe is our personal information from identity thieves?
Cross Online fraud
Brodeur et al. Surveillance fiction or higher policing
Erbschloe Social engineering: Hacking systems, nations, and societies
Chigada Towards an aligned South African national cybersecurity policy framework
Chawki et al. 419 scam: an evaluation of cybercrime and criminal code in Nigeria
O’Kenny A Stroke of the Keyboard and Click of the Mouse: an anatomy of cyber frauds as a growing component of illicit financial flows
Valetk Mastering the Dark Arts of Cyberspace: A Quest for Sound Internet Safety Policies
Antoniou et al. Laundering sexual deviance: targeting online pornography through anti-money laundering
Ojedokun The evolving sophistication of Internet abuses in Africa
Bello Anatomy of cybercrime in Nigeria: The legal chronicle
Biswas Data and information theft in e-commerce, jurisdictional challenges, related issues and response of Indian laws
Oluyemisi et al. The Effect of Cyber-Crimes on Depositors Funds in Deposit Money Banks in Nigeria
Pontell 'Pleased to Meet You Won't You Guess My Name?': Identity Fraud, Cyber-crime and White-collar Delinquency
Hui Modern identity protection: A multifaceted response to a surreptitious threat
Maghfirah et al. Cyber crime and privacy right violation cases of online loans in indonesia
Sibe et al. Research Findings—Cybercrime Composition, Frequency, and Complexity in Nigeria (From a Law Enforcement Perspective)
Harvin THREATS IN CYBERSPACE
Adenusi et al. Challenges and way out of cyber security issues in Nigeria
Bailey et al. Examining the Online Anonymity Debate: How Far Should the Law Go in Mandating User Identification?
Calcara et al. Cybercrime, law and technology in Finland and beyond